Gimme Some Disruptive Innovation!

Hunt, Steve
January 2008
Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p20
Trade Publication
The author challenges the information technology (IT) sector to bring its products and services to the physical security industry in the U.S. He contends that the short-term outlook does not bode well for the IT sector to deliver physical security changes. He wants the sector to create innovations that can turn on physical security and logical security alike.


Related Articles

  • Establishment of Improved Business Security Systems. Wookjae Cha; Dongho Won // World Academy of Science, Engineering & Technology;Feb2011, Issue 50, p1 

    No abstract available.

  • Spending expected to rise for security, disaster recovery. Dietderich, Andrew // Crain's Detroit Business;11/12/2001, Vol. 17 Issue 47, p17 

    Focuses on the attitude of companies towards security spending in the United States for 2002. Increase in technology purchase for network security, disaster recovery and software backup; Efforts of businesses to secure its data; Growth in sales for the information technology industry.

  • Problems of information security of the firm (manufacture) and a way of their decision. Aleshnikov, Sergey; Demin, Sergey; Fedorov, Sergey; Fjodorov, Alexandr // Vestnik IKBFU;2013, Issue 10, p147 

    Problems of information security of the firm (manufacture) are considered. Their decision assumes studying of forms, ways and methods of revealing and the danger prevention in information sphere, and also the optimal control of system of maintenance of information security and a rational choice...

  • Getting IT Right.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p23 

    Discusses the collaboration between security and information technology (IT) executives. Purchasing of software and hardware; Mission to secure an organization's computer and information assets; Security directors' responsibility for information protection and traditional physical security;...

  • Coevolution.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p24 

    Discusses the evolution of the partnership between security system directors and information technology (IT) managers. Acceleration of technology into the security; Integration of security systems; Tools shared by IT and security; Organizations' increased demand for the seamless integration of...

  • Secure By Design. Raikow, David // CIO Insight;Aug2008, Issue 96, p22 

    The article presents a process that will enable information technology (IT) professionals develop a security policy that will meet the needs of their business enterprises. It says that the first step in making a security policy is defining clear priorities based on an effective risk assessment....

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • Climbing the Pixel Ladder without Falling Off. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Nov2011, Vol. 48 Issue 11, p106 

    The article discusses the importance of megapixel cameras as part of video surveillance from a security and business perspective. It provides a detailed account on the three essential factors when matching a megapixel camera to a location, specific need, or as part of the total system, these are...

  • Joining the Dots. Singh, Amit // Dataquest;9/15/2013, Vol. 31 Issue 17, p48 

    The article offers tips on how to protect the business from the growth of security threats and cyber attacks. It mentions that the installment of firewalls is vital for the protection from outside viruses and malware and for the security of corporate network. It adds that sustainable and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics